logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
5th January 2018 by CyberVision 0 Comments 881 Views
5th January 2018 by CyberVision in Business Security

Cryptojacking – A new glitch in the system 

 

Cryptocurrencies such as bitcoin do not emerge from central banks like the money we use daily; they are generated or “mined” by computers solving complex equations. Cryptojacking is the act of using someone’s computer without their knowledge or consent, even just for a few seconds at a time, to mine a cryptocurrency.

 

It works by embedding a JavaScript component in a website that can use a visiting device’s processing power to mine a cryptocurrency. One visitor may only do a little bit of mining while visiting the website, but the collective processing power generated from the site visitor’s activity has the capacity to turn into real money over time. The scary part is that users aren’t aware of what’s happening.

With the increased cryptojacking activity occurring all over the internet, processes put in place to avoid these silent attacks have not been as effective as expected.  Cryptojacking doesn’t require a download, starts instantly, and works efficiently. Researchers say that most cryptojacking is intentional, and that the attacks are evolving in concerning ways. Since cryptojacking is so new, hackers are still developing new ways to maximize their intake.

These attacks serve as a bridge for the many mining technologies that have been slowly percolating over the years. This has brought them together to come up with ways to prevent these types of exploits. An example of these mechanisms put into practice is the Captcha solution and has been around for years. Instead of checking whether a user is human, it has evolved to the extent of implementing intensive mathematical mining puzzles to make it slower and less economically feasible for hackers to load certain pages or perform certain actions on a site.

 

The more these mining technologies layer on top of each other—whether for legitimate purposes or scams—more web users may begin to experience a whole new landscape in the online realm.

 

 

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • cryptocurrency
  • cryptojacking
  • cybersecurity
  • f-secure cyber security
  • hacked
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo